Hi Naveen, All your videos are very informative. Can you please attach the material/slide in google cloud so that we do not require to watch the video again. It will be very useful when we quickly prepare for the interview
Like your channel very much! Thx! Naveen, can you record a video example about using https session with java servlets? What I need to write to use ssl or tsl key in my connection with clients?
Hi Naveen, Thank you very much for the detailed explanation. One doubt after the final step every time they use session key as token? If yes it got any expiry and how the expiry will define
CA is a browser feature which will validate the authenticity of the certificate provided by server. It will check certification is valid and not expired.
Server will encrypt response with private key and then client will decrypt this encrypted response with public key. Correct me if I am wrong? My doubt is as public key is known to Hacker also as it is public then Hacker also can decrypt response.
Hey Naveen While explaining about Asymmetric u have mentioned about 1024/2048 bits, Not able to relate what is 1024 and 2041 in Request and Response ? Thanks for video very helpful
Hi Naveen I am working as QE automation tester can you please tell me for java certification which one I should pick. I need atleast basic java certification
could u help me with one of the issue I am facing in my proj, I have to verify 3 thing on page and the page has the timer which is going fast because of this my script is failing. Any solution for this
One doubt, Is it not possible to hack response data sending from server for any other user's request using public key.? since the hacker is aslo having the public key?
Thank you Naveen for all your videos. Everyday, when I get up in the morning the first thing I do is "Open RUclips on my phone and check for any new videos from Naveen." I have tried to contact you via Facebook Messenger but I was unable to reach you. Please give me a few minutes time to talk to you.
Thanks for wonderful explanation..although we have been taught these during BTech days but can understand it now better from practical point of view.
Wow!!! Its like u have completely gone through the mind of interviewer.
I have faced this same question in one of my interview given few days back.
Thanks Naveen fro an excellent Presentation.
Please make videos for api testing with cypress
Very clear explanation. Thank you
Awesome explanation
Naveen you are just awesome
Interesting topic.. Simple too..!! Thanks for sharing.
Thankyou for your wonderful explanation ....really i learned about SSL by seeing your video
Very nice & precise information.
Tum bahut achha kaam karta hai Naveen
Excellent Video
I understood each and every bit u taught in this video because of your Brilliant explanation. Iam happy to land at your channel.
Thanks lot naveen. Your effort are most valuable
👍, the best detailed explanation 👌I have ever came across on http and https
Take care Naveen and stay safe
Excellant
Nice explanation. Loved it....
Super explanation 👌🏻
Awesome explanation.
Please made video on SAML SSO also...🙏
tq so much naveen sir for this vedio.
Superb explanation!
Hi Naveen, All your videos are very informative. Can you please attach the material/slide in google cloud so that we do not require to watch the video again. It will be very useful when we quickly prepare for the interview
Thank for the video
Hi Naveen, Can you please prepare a video on OpenSSL and Java Keystore on how the private key, public key are generated and CA certificate is stored
Very good video😊
Like your channel very much! Thx! Naveen, can you record a video example about using https session with java servlets? What I need to write to use ssl or tsl key in my connection with clients?
Well explained
Naveen plz make video on yaml... how to configure and usuage espl from tester point of view
Superb
@14:11 it's the encrypted data sent by WS not the decrypted...
Anyways I it's 👍👌👍👌
Hi Naveen, Thank you very much for the detailed explanation.
One doubt after the final step every time they use session key as token? If yes it got any expiry and how the expiry will define
👍
what is mean by HTTP header injection?
Thanks for such excellent video... I am still not clear about certificates..how CA validate certificates and what are parameters to verify
CA is a browser feature which will validate the authenticity of the certificate provided by server. It will check certification is valid and not expired.
How is the transfer of public key and certificate made secured. i.e. if someone gets hold of these things he can use it to decrypt data in the middle
Thank You so much
Hi Naveen, can you please have a video about "Man in the Middle" Attack too ?
Perfect Emoji of a Bad Guy
Server will encrypt response with private key and then client will decrypt this encrypted response with public key.
Correct me if I am wrong?
My doubt is as public key is known to Hacker also as it is public then Hacker also can decrypt response.
Public key is not common to all clients. Every client will have its own public key which is unique provided by server.
@@naveenautomationlabs Thanks for update.
But Hacker can't find this public key?
Hey Naveen While explaining about Asymmetric u have mentioned about 1024/2048 bits, Not able to relate what is 1024 and 2041 in Request and Response ? Thanks for video very helpful
Hi Akula, Its the length of Private key while generating them through some method(For eg: RSA Algorithm)
Hi Naveen I am working as QE automation tester can you please tell me for java certification which one I should pick. I need atleast basic java certification
You can try ocjp certification
could u help me with one of the issue I am facing in my proj, I have to verify 3 thing on page and the page has the timer which is going fast because of this my script is failing. Any solution for this
Hi Naveen do you have a paid course for mobile automation?
One doubt, Is it not possible to hack response data sending from server for any other user's request using public key.? since the hacker is aslo having the public key?
For every client/browser session, public key will be different. Hacker is having his own public key, he can not use the same key to sniff others data.
Thank you Naveen for all your videos. Everyday, when I get up in the morning the first thing I do is "Open RUclips on my phone and check for any new videos from Naveen."
I have tried to contact you via Facebook Messenger but I was unable to reach you. Please give me a few minutes time to talk to you.
You can subscribe to the channel and press the bell button so that you get a notification whenever a new video is uploaded by @naveen.